Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture delves into the Raccoon Attack, a timing attack on TLS-DH(E) that exploits most significant bit oracles. The instructor explains the TLS protocol, key exchange, HMAC, and the impact of the attack on TLS 1.2. The lecture covers the background of the attack, the use of shared secrets, key derivation functions, and the implications for TLS security. The instructor details how the attack works, the hidden number problem, and the lattice construction used to retrieve premaster secrets. The lecture also discusses the practicality of the attack, the differences between static and ephemeral keys, and the importance of avoiding key reuse in TLS. The instructor concludes by highlighting the lessons learned from the Raccoon Attack and the implications for TLS security.